A Novel Approach for Detection of DDoS Attacks in Software-Defined Networks Based on Grey Wolf Optimizer and Support Vector Machine

International Journal of Electrical and Electronics Engineering
© 2024 by SSRG - IJEEE Journal
Volume 11 Issue 3
Year of Publication : 2024
Authors : Aminata Dembele, Elijah Mwangi, Kennedy K. Ronoh, Edwin O. Ataro
pdf
How to Cite?

Aminata Dembele, Elijah Mwangi, Kennedy K. Ronoh, Edwin O. Ataro, "A Novel Approach for Detection of DDoS Attacks in Software-Defined Networks Based on Grey Wolf Optimizer and Support Vector Machine," SSRG International Journal of Electrical and Electronics Engineering, vol. 11,  no. 3, pp. 86-96, 2024. Crossref, https://doi.org/10.14445/23488379/IJEEE-V11I3P107

Abstract:

Software-defined networks face attacks that hinder efficient network provision and prevent users from accessing systems. Attack detection is crucial for better service provision and system resilience. Existing SDN-based Distributed Denial of Service (DDoS) detection technologies suffer from low accuracy, which is attributed to inadequate feature extraction and resultsin elevated false negative rates. This study introduces a solution leveraging the Grey Wolf Optimizer algorithm for feature selection to enhance DDoS attack detection and categorization. Employing a novel binary Grey Wolf optimization and Support Vector Machine (SVM) classifier on the InSDN dataset for SDNs, the proposed approach demonstrates superior performance, achieving 100% accuracy and recall. Feature selection with Binary Grey Wolf yields a 97% F1-Score using the unimodal equation and 100% accuracy, 96% recall, and a 98% F1-Score with the multi-modal equation, underscoring its efficacy in bolstering SDN security against DDoS attacks.

Keywords:

Intrusion Detection System, SDN, DDoS attack, SVM, Grey Wolf Optimizer, Binary Grey Wolf Optimizer, InSDN dataset.

References:

[1] Fetia Bannour, Sami Souihi, and Abdelhamid Mellouk, “Distributed SDN Control: Survey, Taxonomy, and Challenges,” Communications Surveys and Tutorials, vol. 20, no. 1, pp. 333-354, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Ali Nadim Alhaj, and Nitul Dutta, “Analysis of Security Attacks in SDN Network: A Comprehensive Survey,” Contemporary Issues in Communication, Cloud and Big Data Analytics, pp. 27-37, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Wesam Bhaya, and Mehdi Ebady Manaa, “Review Clustering Mechanisms of Distributed Denial of Service Attacks,” Journal of Computer Science, vol. 10, no. 10, pp. 2037-2046, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Ansam Khraisat et al., “Survey of Intrusion Detection Systems: Techniques, Datasets and Challenges,” Cybersecurity, vol. 2, no. 1, pp. 1-22, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Hongyu Liu, and Bo Lang, “Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey,” Applied Sciences, vol. 9, no. 20, pp. 1-28, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Andi Maslan et al., “Feature Selection for DDoS Detection Using Classification Machine Learning Techniques,” IAES International Journal of Artificial Intelligence, vol. 9, no. 1, pp. 137-145, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Mona Alduailij et al., “Machine-Learning-Based DDoS Attack Detection Using Mutual Information and Random Forest Feature Importance Method,” Symmetry, vol. 14, no. 6, pp. 1-15, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Mahmoud Said ElSayed et al., “A Novel Hybrid Model for Intrusion Detection Systems in SDNs Based on CNN and A New Regularization Technique,” Journal of Network and Computer Applications, vol. 191, pp. 1-18, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Qusay M. Alzubi et al., “Intrusion Detection System Based on a Modified Binary Grey Wolf Optimisation,” Neural Computing and Applications, vol. 32, pp. 6125-6137, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Rochak Swami, Mayank Dave, and Virender Ranga, “Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking,” Wireless Personal Communications, vol. 118, pp. 2295-2317, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Lotfi Mhamd et al., “A Deep Learning Approach Combining Autoencoder with One-Class SVM for DDoS Attack Detection in SDNs,” 2020 IEEE Eighth International Conference on Communications and Networking (ComNet), Hammamet, Tunisia, pp. 1-6, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Ediga Sathyanarayana Phalguna Krishna, and Thangavelu Arunkumar, “Hybrid Particle Swarm and Gray Wolf Optimization Algorithm for IoT Intrusion Detection System,” International Journal of Intelligent Engineering and Systems, vol. 14, no. 4, pp. 66-76, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Abdulaziz Almazyad, Laila Halman, and Alaa Alsaeed, “Probe Attack Detection Using An Improved Intrusion Detection System,” Computers, Materials & Continua, vol. 74, no. 3, pp. 4769-4784, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Mahmoud Said Elsayed, Nhien-An Le-Khac, and Anca D. Jurcut, “InSDN: A Novel SDN Intrusion Dataset,” IEEE Access, vol. 8, pp. 165263-165284, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Seyedali Mirjalili, Seyed Mohammad Mirjalili, and Andrew Lewis, “Grey Wolf Optimizer,” Advances in Engineering Software, vol. 69, pp. 46-61, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Qasem Al-Tashi et al., “A Review of Grey Wolf Optimizer-Based Feature Selection Methods for Classification,” Evolutionary Machine Learning Techniques, pp. 273-286, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[17] E. Emary, Hossam M. Zawbaa, and Aboul Ella Hassanien, “Binary Grey Wolf Optimization Approaches for Feature Selection,” Neurocomputing, vol. 172, pp. 371-381, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[18] P. Karthika, and Karmel Arockiasamy, “Simulation of SDN Mininet and Detection of DDoS Attack Using Machine Learning,” Bulletin of Electrical Engineering and Information, vol. 12, no. 3, pp. 1797-1805, 2023.
[CrossRef] [Google Scholar] [Publisher Link]